The security goal that generates the requirement for actions of an entity to be traced
uniquely to that entity. This supports non- repudiation, deterrence, fault isolation,
intrusion detection and prevention, and after-action recovery and legal action.
SOURCE: SP 800-27
Principle that an individual is entrusted to safeguard and control equipment, keying
material, and information and is answerable to proper authority for the loss or misuse
of that equipment or information.